CN105868079A - Method for Java memory inefficient usage detection based on memory usage propagation analysis - Google Patents

Method for Java memory inefficient usage detection based on memory usage propagation analysis Download PDF

Info

Publication number
CN105868079A
CN105868079A CN201610251576.4A CN201610251576A CN105868079A CN 105868079 A CN105868079 A CN 105868079A CN 201610251576 A CN201610251576 A CN 201610251576A CN 105868079 A CN105868079 A CN 105868079A
Authority
CN
China
Prior art keywords
memory
internal memory
program
software
node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610251576.4A
Other languages
Chinese (zh)
Other versions
CN105868079B (en
Inventor
姜淑娟
李文杰
王兴亚
鞠小林
王荣存
张艳梅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China University of Mining and Technology CUMT
Original Assignee
China University of Mining and Technology CUMT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China University of Mining and Technology CUMT filed Critical China University of Mining and Technology CUMT
Priority to CN201610251576.4A priority Critical patent/CN105868079B/en
Publication of CN105868079A publication Critical patent/CN105868079A/en
Application granted granted Critical
Publication of CN105868079B publication Critical patent/CN105868079B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3051Monitoring arrangements for monitoring the configuration of the computing system or of the computing system component, e.g. monitoring the presence of processing resources, peripherals, I/O links, software programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Debugging And Monitoring (AREA)

Abstract

Provided is a method for Java memory inefficient usage detection based on memory usage propagation analysis. The method for Java memory inefficient usage detection based on memory usage propagation analysis comprises a step 1) of performing static analysis on software and performing instrumentation, and obtaining event information relevant with memory usage through dynamic execution; a step 2) of performing memory usage propagation analysis according to the obtained information and constructing a memory usage propagation map; a step 3) of performing feature analysis identification on memory usage information contained in the memory usage propagation map, and detecting the problem of inefficient usage of a memory in software; a step 4) of performing context path analysis on the software, detecting a root cause resulting in the problem, and performing positioning and repairing against the problem. The problem that inefficient usage of a software memory cannot be effectively detected through an existing test method is solved, software performances and expansibility are greatly improved, software test working efficiency is improved, and thus the product quality is controlled better.

Description

A kind of use based on internal memory propagates the Java Memory Low Usage use detection method analyzed
Technical field
The invention belongs to software testing technology field, and feature has been invented a kind of use based on internal memory and propagated analysis Java Memory Low Usage uses detection method.
Background technology
Software test is one is intended to the inquiry activity that helper applications practitioner assesses the quality condition of tested software.? In complete software development flow, software test activity is carried throughout, occupies the most of the time of development project, needs Substantial amounts of human and material resources puts into.Software test procedure outstanding, successful can be found out present in tested software product Mistake, defect, inefficacy and accident, thus helper applications product development person carries out the most effective reparation and changes software product It is apt to, and improves the quality of software product, shorten the gap between software product and the product demand developed, soft by develop The quality and functionality deviation of part product controls within tolerance interval.
Memory Low Usage uses and refers to exist in program process the memory consumption of bulk redundancy, i.e. memory consumption and these The contribution that internal memory execution normal to program brings is uneven (the most excessive memory consumption is to complete simple program task).Existing Becoming increasingly complex for software systems, large-scale framework intensity software gets more and more so that Memory Low Usage uses problem generally to exist. Substantial amounts of research shows that Memory Low Usage uses problem can affect the runnability of software, and is difficult to diagnose and repair.Along with program Execution scale constantly expand, if Memory Low Usage in program uses problem to concentrate triggering under high operating load, will cause Program feature significantly reduces, and hinders and reaches intended performance indications, even initiator collapse.Therefore, make for Memory Low Usage Carry out studying most important by problem.
Summary of the invention
Present invention aim at providing a kind of use based on internal memory to propagate the Java Memory Low Usage use detection method analyzed, The method of testing that the present invention presently, there are can not effectively inspection software Memory Low Usage use problem, the performance of software is substantially improved And extensibility, improve Experience of Software Testing Work efficiency, thus better control over the quality of product.
For reaching above-mentioned purpose, the present invention proposes a kind of use based on internal memory and propagates the Java Memory Low Usage use inspection analyzed Survey method.Method comprises the following steps:
1) internal memory uses the collection of relevant information, the byte code files of java applet is carried out static analysis, by wherein Relevant statement is used to carry out pitching pile to carry out acquisition of information to internal memory.Owing to the memory consumption of object-oriented program is the most right The establishment of elephant and use are caused, and object is made up of method and field.Therefore, acquisition relates to three kinds of things that internal memory uses Part: Object Creation, method call and field access.
2) internal memory uses the structure propagating figure (MUPG), uses the memory usage information that step 1) obtains, superfluous by eliminating Remaining memory usage information is simplified, be polymerized and use propagation figure (MUPG, Memory Usage into internal memory Propagation Profiling).The structure of MUPG comprises two parts: polymerization internal memory uses event and polymerisation loop structure.
3) signature analysis, program internal memory poor efficiency uses and mainly shows as the program execution that object memory consumption brings with it Imbalance between contribution, by internal storage access rate, memory usage and interim Memory Allocation rate three category feature analysis, detects journey In sequence, Memory Low Usage that may be present uses problem;
Signature analysis 1: internal storage access rate
The computing formula of internal storage access rate (Memory Access Rate, MAR) is:
Wherein,Represent the total accessed number of times of object type, its be method call number of times () visit with field Ask number of times () sum,Represent the object number created;
Signature analysis 2: memory usage
The computing formula of memory usage (Memory Utilization Rate, MUR) is:
Wherein,Represent object type effectively utilizes the time,The time point being initially utilized for this object type, The time point being finally utilized for this object type.Represent the existence time that this object type object is total, its InRepresent the time point that last object of this object type is released,Represent that this object type first is right As the time point being created.
Signature analysis 3: interim Memory Allocation rate
The computing formula of interim Memory Allocation rate (Temporary Memory Allocation Rate, TMAR) is:
Wherein,Representation program perform during i-th GC moment a certain object type keep quote object number () with this moment created object number () ratio,Representation program completely perform during GC number;
By above three category feature analyses, detect the suspect object type causing program internal memory poor efficiency to use.Obtain suspicious After object type, according to the object number of object type, suspicious object type is carried out importance ranking;
4) context path analysis, step 3) after obtaining there is the suspect object type that Memory Low Usage uses problem, foundation The contextual information that MUPG provides carries out internal memory and uses propagation to analyze, and studies these object types shadow by which program area Ring, analyze the program area causing Memory Low Usage to use.When internal memory uses and propagates analysis, each path branches is calculated it Importance value W, by arranging threshold value, filters out those paths less on memory consumption impact, obtains causing Memory Low Usage to make Critical path.
If node A is node to be analyzed, it is called by multiple father nodes, and B is a father node of A, then father node B antithetical phrase The importance value of node AComputing formula be:
Wherein,Represent the number of times that between node B and node A, path performs,Represent node A father node a certain with it i it Between path perform number of times, N represents total number of the father node of node A.
The detailed process of context path analysis is: threshold value, node to be analyzed and MUPG are tied as input, path analysis Fruit is as output.During path analysis, threshold value t is set, only meets or exceeds t when the W value of the father node of analysis node Time, just continue this father node is carried out path analysis.Finally give the main program execution route causing Memory Low Usage to use.
Further, wherein above-mentioned steps 1) specifically comprise the following steps that
Step 1)-1: initial state;
Step 1)-2: Java software is carried out static analysis, carries out pitching pile to the statement being directed to internal memory use;
Step 1)-3: perform program, obtains internal memory in program process and uses event information;
Step 1)-4: every internal memory uses the content of event message, the information such as time is deposited into database;
Step 1)-5: the acquisition of software memory use event message is complete;
Further, wherein above-mentioned steps 2) specifically comprise the following steps that
Step 2)-1: initial state;
Step 2)-2: from database, read the internal memory being not handled by use event message;
Step 2)-3: use the type of event, event to occur the static address at place that the information obtained is gathered according to internal memory Conjunction processes;
Step 2)-4: analyzing the direct dependence of information after polymerization processes, the most whether detection exists loop structure, if Exist, circulation result therein is carried out polymerization process;
Step 2)-5: internal memory uses propagation figure to generate complete;
Further, wherein above-mentioned steps 3) specifically comprise the following steps that
Step 3)-1: initial state;
Step 3)-2: the software memory for generating uses propagates figure, by internal storage access rate, memory usage and interim internal memory Apportionment ratio three category feature analysis, whether the object set that the node in detection figure comprises exists Memory Low Usage uses problem.Calculate Method is as follows: internal memory is used to each node propagated in figure, the size of its three category features value of analytical calculation:
Characteristic value 1: internal storage access rate
Characteristic value 2: memory usage
Characteristic value 3: interim Memory Allocation rate
Step 3)-3: select threshold value n of a signature analysis according to the actual memory service condition of software;
Step 3)-4: the signature analysis value of each node compared with n, if signature analysis value is less than threshold value n, then will It is classified as the suspect node that there is Memory Low Usage use problem;
Step 3)-5: all of suspect node be ranked up according to the memory size consumed, obtains suspicious Memory Low Usage and uses Node listing;
Further, wherein above-mentioned steps 4) specifically comprise the following steps that
Step 4)-1: initial state;
Step 4)-2: read the suspect object type node report list obtained;
Step 4)-3: obtain the important object relevant to suspect object type and create address (according to the object number size created It is ranked up) and object use address (being ranked up according to the size performing number of times);
Step 4)-4: Object Creation address and object use address to each suspect object type carry out context path and divide Analysis;
Step 4)-5: by arranging threshold value during path analysis, calculates the importance value of path branches, it is thus achieved that important road Footpath;
Step 4)-6: the context path information causing Memory Low Usage to use is reported to responsible developer;
The present invention uses the method for program pitching pile to use event information to the internal memory collecting in software running process, can be effective The internal memory service condition of program is monitored;Internal memory is used to use the method propagating analysis to study in software running process Deposit the detailed process of consumption, and by the method for signature analysis, the region that there is Memory Low Usage use in software is positioned; Finally the suspect object type detected is carried out context path analysis, obtain the basic reason causing problem to produce, help Software developer carries out defect repair, improves Experience of Software Testing Work efficiency, thus better controls over the quality of product.
Accompanying drawing explanation
Fig. 1 is that a kind of the use based on internal memory of the embodiment of the present invention propagates the Java Memory Low Usage use detection method analyzed Flow chart.
Fig. 2 is the flow chart of the collection that software memory uses message in Fig. 1.
Fig. 3 is the flow chart that in Fig. 1, software memory uses that propagation figure builds.
Fig. 4 is the flow chart that in Fig. 1, software features is analyzed.
Fig. 5 is the flow chart of context of software path analysis in Fig. 1.
Detailed description of the invention
In order to know more about the technology contents of the present invention, especially exemplified by specific embodiment and coordinate institute's accompanying drawings to be described as follows.
Fig. 1 is that a kind of the use based on internal memory of the embodiment of the present invention propagates the Java Memory Low Usage use detection method analyzed Flow chart.
A kind of use based on internal memory propagates the Java Memory Low Usage use detection method analyzed, it is characterised in that under including Row step:
S101 internal memory uses the collection of relevant information, the byte code files of java applet is carried out static analysis, by it In use relevant statement to carry out pitching pile to carry out acquisition of information to internal memory.Owing to the memory consumption of object-oriented program is mainly The establishment of object and use are caused, and object is made up of method and field.Therefore, acquisition relates to three kinds of things that internal memory uses Part: Object Creation, method call and field access.;
S103 internal memory uses the structure propagating figure, uses the memory usage information that step 1) obtains, by eliminating redundancy to internal memory Use information simplifies, and is polymerized and uses propagation figure into internal memory.Internal memory uses the structure of propagation figure to comprise two parts: poly- Close internal memory and use event and polymerisation loop structure;
S105 signature analysis, the software memory for generating uses propagates figure, by internal storage access rate, memory usage and interim Memory Allocation rate three category feature analysis, whether the object set that the node in detection figure comprises exists Memory Low Usage uses problem, And node is carried out importance ranking;
S107 context path is analyzed, and the suspect node ranking that the existence Memory Low Usage obtained according to signature analysis uses, to joint Point carries out path analysis morning and afternoon, obtains the basic reason causing program internal memory poor efficiency to use.And by analysis result and program source Code information combines, and is reported by detailed diagnostic result and carries out problem understanding and reparation to software developer.
Fig. 2 is the flow chart that internal memory uses relevant information.By the byte code files to java applet Carry out pitching pile, use relevant Object Creation, method call and variables access three class event to be monitored to internal memory, and store In database.Specifically comprise the following steps that
Step 1: initial state;Step 2: Java software is carried out static analysis, is carried out the statement being directed to internal memory use Pitching pile;Step 3: perform program, obtains internal memory in program process and uses event information;Step 4: every internal memory is used The content of event message, the information such as time is deposited into database;Step 5: the acquisition of software memory use event message is complete;
Fig. 3 is to build internal memory to use the flow chart of propagation figure, uses the memory usage information that step 1) obtains, by eliminating redundancy Memory usage information is simplified, is polymerized and uses propagation figure into internal memory.Specifically comprise the following steps that
Step 1: initial state;Step 2: read the internal memory being not handled by from database and use event message;Step 3: The static address that place occurs according to the type of event, event carries out polymerization process to the information obtained;Step 4: analyze polymerization The direct dependence of information after process, carries out polymerization process to loop structure therein;Step 5: internal memory uses propagates figure Generate complete.
Fig. 4 is characterized the flow chart of analysis.Software memory for generating uses propagates figure, by internal storage access rate, interior Depositing utilization rate and interim Memory Allocation rate three category feature analysis, whether the object set that the node in detection figure comprises exists internal memory Poor efficiency uses problem, and node is carried out importance ranking.Specifically comprise the following steps that
Step 1: initial state;Step 2: by three category feature analyses, obtains internal memory and uses three classes of each node in propagation figure Characteristic value size;Step 3: select threshold value n of a signature analysis according to the actual memory service condition of software;Step 4: will be each The characteristic value of individual node compares with n, finds out the suspect node that there is Memory Low Usage use problem;Step 5: by suspect node It is ranked up according to memory consumption size, obtains the node listing that suspicious Memory Low Usage uses;Step 6: internal memory uses propagates figure Build complete.
The flow chart that Fig. 5 context path is analyzed.The suspicious joint that the existence Memory Low Usage obtained according to signature analysis uses Point ranking, carries out path analysis morning and afternoon, obtains the basic reason causing program internal memory poor efficiency to use node.And analysis is tied Fruit is combined with program's source code information, reports detailed diagnostic result to software developer.Specifically comprise the following steps that
Step 1: initial state;Step 2: read the suspect object type node report list obtained;Step 3: it is suspicious right to obtain The Object Creation address relevant as type and object use address;Step 4: the Object Creation address to each suspect object type Address is used to carry out context path analysis with object;Step 5: by arranging threshold value during path analysis, calculates path The importance value of branch, it is thus achieved that important path;Step 6: the context path information causing Memory Low Usage to use is reported to negative Duty developer;Step 7: context path is analyzed complete.
In sum, the present invention solves the problem that the software memory poor efficiency use problem that presently, there are is difficult to detect, no Software memory poor efficiency is only greatly improved and uses efficiency and the accuracy of problem detection, and improve software memory problem detection Automaticity, and then improve Experience of Software Testing Work efficiency, thus better control over the quality of product.

Claims (5)

1. one kind uses the Java Memory Low Usage propagating analysis to use detection method based on internal memory, it is characterised in that first by journey Internal memory in sequence uses abstract the use for internal memory of event information to propagate figure, provides, with this, the internal memory behavior that program is complete, the most logical Crossing and internal memory behavior is carried out signature analysis identification, the Memory Low Usage being detected and determined in program uses problem, last according to internal memory The context path information analysis using propagation figure to provide causes the program area that problem produces, and is automatically made by software memory poor efficiency Distribute to the software developer of correspondence with defect report, software developer, according to software deficiency report positioning software defect, goes forward side by side Row is repaired;The method comprises the following steps:
1) internal memory uses the collection of relevant information, the byte code files of java applet is carried out static analysis, by wherein Relevant statement is used to carry out pitching pile to carry out acquisition of information to internal memory;The establishment of the memory consumption of program mainly object and making With caused, and object is made up of method and field;Therefore, we obtain and relate to three kinds of events that internal memory uses:
1. Object Creation;Object Creation is the immediate cause causing heap memory to consume, and is therefore monitored Object Creation event The initiation point causing a large amount of memory consumption of program can be analyzed;
2. method call;Method call is the major way that in program process, each data structure interprocedual is mutual, is also The principal mode utilizing the object created, therefore is monitored obtaining program process to method call event In contact between each data structure, analyze distinct program region incidence relation on memory consumption, obtain object simultaneously Service condition;
3. field accesses;Object is made up of method and field two parts, it is judged that whether object is used except to method call thing Outside part is monitored, it is also very important content that monitoring field accesses;
By using event to be monitored three class internal memories, it is possible to obtain heap memory complete in program process uses letter Breath, i.e. causes the concrete internal memory behavior of memory consumption;
2) internal memory uses the structure propagating figure (MUPG);
After obtaining internal memory use event letter, by eliminating redundancy, memory usage information is simplified, be polymerized as internal memory Use and propagate figure (MUPG);The structure of MUPG comprises two parts:
(1) polymerization internal memory uses event
Definition 1: polymerization internal memory uses event to comprise following four determinant attribute, i.e. description, environment, input and export;
Describe: represent the overall description that software memory uses, for the abstract internal memory behavior representing software, analyze the interior of software Deposit service condition;
Environment: include software environment and the hardware environment of running software;
Input: include that the three class internal memories got use event information;
Output: the result after polymerization analysis;
The internal memory using step 1) to get uses event information, and static address similar events type occurred according to event enters Row polymerization, and according to descriptions, environment, the format organization that inputs, export, Automatic Combined becomes a software memory use mould Type;
(2) polymerisation loop structure
Program process easily occurs the recursive call between method, causes MUPG comprises loop structure;Use strong continune The loop structure being directed to is detected by structure detection algorithm, and uses single node to be indicated;For representing each The node of loop structure, as an entirety;Similar with step 1, the loop structure node comprising identical content is carried out Packet aggregation, uses single node to be indicated;
3) signature analysis;
Program internal memory poor efficiency uses the injustice mainly shown as between object memory consumption and its program execution contribution brought Weighing apparatus;By internal storage access rate, memory usage and interim Memory Allocation rate three category feature analysis, that may be present in detection program Memory Low Usage uses problem;
Signature analysis 1: internal storage access rate
In program process, it is understood that there may be some object types create a large amount of object, but these objects are rarely used, Obviously this is the phenomenon that a kind of internal memory is used inefficiently;Internal storage access rate (Memory Access Rate, MAR) is a certain Object type is accessed the ratio between number of times and this object type object number, and ratio is the least, then this object type institute is described The possibility that the internal memory consumed is used inefficiently is the biggest;The computing formula of MAR is:
(1)
Wherein,Represent the total accessed number of times of object type, its be method call number of times () visit with field Ask number of times () sum,Represent the object number created;
Signature analysis 2: memory usage
In program process, it is understood that there may be after some objects are created in a large number, the most only in the short period of its life cycle It is utilized in Duan, it is clear that this is also the phenomenon that a kind of internal memory is used inefficiently;These objects use in end and are finally released Longer period in, will bootlessly expend a large amount of memory source, the performance of program will be caused to be had a strong impact on;Memory usage (Memory Utilization Rate, MUR) is the time that the object of a certain object type is actually utilized and deposits with total Ratio between the time;The computing formula of MUR value is:
(2)
Wherein,Represent object type effectively utilizes the time,The time point being initially utilized for this object type,For The time point that this object type is finally utilized, i.e. existsOutside time period in do not have any about this object type pair The event that utilizes of elephant occurs;Represent the existence time that this object type object is total, whereinRepresenting should The time point that last object of object type is released,Represent the time that first object of this object type is created Point, i.e. existsOutside time period in there is no the object of this object type any;
Signature analysis 3: interim Memory Allocation rate
Creating of a large amount of temporary objects will cause memory source expense and the refuse collection frequently of costliness, increase what program performed Load;Detect those object types creating a large amount of object, if keeping quoting in heap memory (is not returned by garbage collector Receive) number of objects be far smaller than the quantity of its created object, then show this object type be likely that there are substantial amounts of temporarily Object;Interim Memory Allocation rate (Temporary Memory Allocation Rate, TMAR) is each GC moment object class Type keeps the mean value of ratio between the number of objects quoted and total the establishments quantity of the type, and TMAR value is the least, then illustrate interior Deposit the possibility being used inefficiently the biggest;
The computing formula of TMAR value is:
(3)
Wherein,Representation program perform during i-th GC moment a certain object type keep quote object number () with this moment created object number () ratio,Representation program completely perform during GC number;
By above three category feature analyses, detect the suspect object type causing program internal memory poor efficiency to use;
After obtaining suspect object type, according to the object number of object type, suspicious object type is carried out importance row Sequence;
4) context path analysis;
After obtaining there may be the suspect object type that Memory Low Usage uses problem, the contextual information provided according to MUPG Carrying out internal memory uses propagation to analyze, and studies these object types by which program area are affected, analyzes and cause Memory Low Usage The program area used;For reducing the resource overhead during analyzing and obtaining the key reason causing Memory Low Usage to use, only The important object relevant to suspect object type is created address (being ranked up according to the object number size created) and object Address (being ranked up according to the size performing number of times) is used to be analyzed;Meanwhile, when path analysis, each path is divided Prop up and calculate its importance value W, by arranging threshold value, filter out those paths less on memory consumption impact, in obtaining causing Deposit the critical path that poor efficiency uses;If node A is node to be analyzed, it is called by multiple father nodes, and B is a father node of A, The then father node B importance value to child node AComputing formula be:
(4)
Wherein,Represent the number of times that between node B and node A, path performs,Represent node A father node a certain with it i it Between path perform number of times, N represents total number of the father node of node A;The detailed process of context path analysis is: by threshold Value, node to be analyzed and MUPG are as input, and path analysis result is as output;During path analysis, threshold value t is set, Only when the W value of the father node of analysis node meets or exceeds t, just continue this father node is carried out path analysis;
Finally give the main program execution route causing Memory Low Usage to use.
The most according to claim 1 use based on internal memory propagates the Java Memory Low Usage use detection method analyzed, and it is special Levying and be, in step 1), software memory uses information to collect by software carries out static pitching pile;Concrete internal memory uses Information includes Object Creation, method call, variables access three class event information.
The most according to claim 1 use based on internal memory propagates the Java Memory Low Usage use detection method analyzed, and it is special Levy and be, in step 2) in, use event type and static address to be grouped according to internal memory the memory usage information obtained Polymerization, carries out polymerization process to the loop structure wherein comprised, and generates internal memory and uses propagation figure MUPG.
The most according to claim 1 use based on internal memory propagates the Java Memory Low Usage use detection method analyzed, and it is special Levy and be, in step 3), by three category feature analyses, provide the suspect object causing program internal memory poor efficiency to use for programmer Type;Meanwhile, according to the object number of object type, suspicious object type is carried out importance ranking.
The most according to claim 1 use based on internal memory propagates the Java Memory Low Usage use detection method analyzed, and it is special Levy and be, in step 4), for the suspect object type detected, automatically analyze out cause its Memory Low Usage to use basic Reason;Specifically comprise the following steps that by calculating each father node importance value W about child node, to suspect object type When carrying out path analysis, selected threshold value t, only divide when the importance value W node more than t just proceeds context path Analysis, finally gives the main program execution route causing Memory Low Usage to use.
CN201610251576.4A 2016-04-21 2016-04-21 It is a kind of to use detection method using the Java Memory Low Usage for propagating analysis based on memory Expired - Fee Related CN105868079B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610251576.4A CN105868079B (en) 2016-04-21 2016-04-21 It is a kind of to use detection method using the Java Memory Low Usage for propagating analysis based on memory

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610251576.4A CN105868079B (en) 2016-04-21 2016-04-21 It is a kind of to use detection method using the Java Memory Low Usage for propagating analysis based on memory

Publications (2)

Publication Number Publication Date
CN105868079A true CN105868079A (en) 2016-08-17
CN105868079B CN105868079B (en) 2019-02-26

Family

ID=56632666

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610251576.4A Expired - Fee Related CN105868079B (en) 2016-04-21 2016-04-21 It is a kind of to use detection method using the Java Memory Low Usage for propagating analysis based on memory

Country Status (1)

Country Link
CN (1) CN105868079B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107632929A (en) * 2017-08-21 2018-01-26 北京京东尚科信息技术有限公司 A kind of method and apparatus for detecting memory overflow
CN109646949A (en) * 2017-10-11 2019-04-19 腾讯科技(深圳)有限公司 Object processing method, device, storage medium and electronic device
CN112148428A (en) * 2020-09-11 2020-12-29 北京基调网络股份有限公司 Java virtual machine memory monitoring method, computer equipment and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120102362A1 (en) * 2010-10-22 2012-04-26 Hitachi, Ltd. Management system and management method
CN102968375A (en) * 2012-11-30 2013-03-13 中国矿业大学 Inaccessible path detection method based on association rule mining

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120102362A1 (en) * 2010-10-22 2012-04-26 Hitachi, Ltd. Management system and management method
CN102968375A (en) * 2012-11-30 2013-03-13 中国矿业大学 Inaccessible path detection method based on association rule mining

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李文杰 等: "基于对象引用关系的Java程序内存行为分析方法", 《电子学报》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107632929A (en) * 2017-08-21 2018-01-26 北京京东尚科信息技术有限公司 A kind of method and apparatus for detecting memory overflow
CN107632929B (en) * 2017-08-21 2020-06-05 北京京东尚科信息技术有限公司 Method and device for detecting memory leakage
CN109646949A (en) * 2017-10-11 2019-04-19 腾讯科技(深圳)有限公司 Object processing method, device, storage medium and electronic device
CN109646949B (en) * 2017-10-11 2021-06-08 腾讯科技(深圳)有限公司 Object processing method, device, storage medium and electronic device
CN112148428A (en) * 2020-09-11 2020-12-29 北京基调网络股份有限公司 Java virtual machine memory monitoring method, computer equipment and storage medium

Also Published As

Publication number Publication date
CN105868079B (en) 2019-02-26

Similar Documents

Publication Publication Date Title
Lee Software quality factors and software quality metrics to enhance software quality assurance
CN103235881B (en) A kind of nuclear reactor fault monitoring system based on minimal cut set
CN108647145A (en) software memory safety detection method and system
CN105868116A (en) Semantic mutation operator based test case generation and optimization method
CN105183796A (en) Distributed link prediction method based on clustering
CN108153587B (en) Slow task reason detection method for big data platform
CN106021771A (en) Method and device for diagnosing faults
CN103713933B (en) Focus function, the assemblage method of variable, apparatus and system in computer program
Oyetoyan et al. A study of cyclic dependencies on defect profile of software components
CN103294595B (en) A kind of software repair based on genetic algorithm
CN105808438A (en) Test case reuse method based on function call path
CN105868079A (en) Method for Java memory inefficient usage detection based on memory usage propagation analysis
CN106446688A (en) DCR-based dynamic vulnerability detection method and system
CN102799960B (en) The concurrent service flow process method for detecting abnormality of data-orlented model
CN105302724A (en) Instant defect predicting method based on mixed effect removing
CN105930900A (en) Method and system for predicting hybrid wind power generation
Verhoef et al. Structuring modelling knowledge for CASE shells
CN111444079B (en) Software defect repairing method and device
CN104898039A (en) Fault propagation probability model-based fault mode preferential selection method
CN102521135B (en) The method of testing of linear system and device
Li et al. Computational efficiency of parallel combinatorial or-tree searches
CN105528296B (en) A kind of class cluster test method of object-oriented software
CN112433908A (en) Method, system, device and medium for determining interval time of detection server
CN101894073A (en) Defect automatic positioning device based on control flow intersection and automatic positioning method thereof
CN102982282A (en) Program bug detection system and method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190226

Termination date: 20200421